-
**Is your feature request related to a problem? Please describe.**
Responses generated within the proxy (i.e. local replies) are not counted towards cluster/VirtualCluster stats, which means aggregat…
-
Some regexes are used quite often in NM plugins, such as the 'IP address or domain name' regex. NM should store these in a central location and provide an interface to access them for plugin developer…
-
Hello Gitlab hacker users, Im here trying to use your instaBrute force tool. For testing purpposes
I installed all the requirements needed for this tool to work, but when I do the following, it doee…
-
Magic abilities for magic attack style, ranged abilities for ranged, melee for melee. Universal abilities (like sacrifice, tuska's wrath) should be applicable to all 3 attack styles.
For example, u…
-
```
What steps will reproduce the problem?
1.Click on the AP
2.Click on WPS attack
What version of the product are you using? On what operating system?
I am Running backtrack 5 r3. i just updated…
-
```
What steps will reproduce the problem?
1.Click on the AP
2.Click on WPS attack
What version of the product are you using? On what operating system?
I am Running backtrack 5 r3. i just updated…
-
```
What steps will reproduce the problem?
1.Click on the AP
2.Click on WPS attack
What version of the product are you using? On what operating system?
I am Running backtrack 5 r3. i just updated…
-
### 🔖 Feature description
Since you are already running an Antivirus, here is another suggestion: Web security scanners. Like skipfish. Like the w3af. Like dictionary / word list attacks. Like Nexp…
-
```
What steps will reproduce the problem?
/
Collected all necessary data to mount crack against WPA2/PSK passphrase.
Starting dictionary attack. Please be patient.
Using STDIN for hashfile contents.…
-
```
What steps will reproduce the problem?
/
Collected all necessary data to mount crack against WPA2/PSK passphrase.
Starting dictionary attack. Please be patient.
Using STDIN for hashfile contents.…